Multiple Choice
How to combine asymmetric and symmetric key encryptions to make the most of their strengths? Choose the LEAST accurate statement in describing the procedure from A to E.
A) Party A creates a single key for a session (called session key) .
B) Party A encrypts the session key using Party B's private key and sends it to Party B.
C) Party B decrypts that secret session key with Party B's private key.
D) Both parties now encrypt data with the session key.
E) With the session key, encryption and decryption are faster than using the asymmetric key system.
Correct Answer:

Verified
Correct Answer:
Verified
Q2: Choose an INCORRECT statement about the digital
Q3: Choose the LEAST accurate statement of the
Q4: The IPsec technology can be deployed in
Q5: Which is CORRECT about hashing?<br>A) Hashing takes
Q6: The main components of a cryptography system
Q7: The hash function is used to derive
Q8: The cipher text is _.<br>A) a message
Q9: In total, how many different keys should
Q10: Choose a CORRECT statement regarding SSL.<br>A) The
Q11: When IPv6 is in full swing, _